EP2916483A1 - Transaction system and transaction method - Google Patents
Transaction system and transaction method Download PDFInfo
- Publication number
- EP2916483A1 EP2916483A1 EP13850096.2A EP13850096A EP2916483A1 EP 2916483 A1 EP2916483 A1 EP 2916483A1 EP 13850096 A EP13850096 A EP 13850096A EP 2916483 A1 EP2916483 A1 EP 2916483A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- transaction data
- electronic signature
- transaction
- signature token
- signed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the present disclosure relates to a field of information security, and more particularly relates to a transaction system and a transaction method.
- an identity authentication for a user is required.
- an electronic signature token is increasingly applied in many occasions (such as the bank transaction, the network transaction). At present, there is only one electronic signature token corresponding to an individual user or an enterprise user. If a transaction is performed by using this electronic signature token, there are following problems.
- the present disclosure seeks to solve at least one of the above problems.
- the transaction system includes: a first electronic signature token, configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data; a network bank server, configured to receive the first signed transaction data sent by the first electronic signature token, to verify the first signed transaction data, and to send the transaction data if the first signed transaction data is successfully verified; and at least one second electronic signature token, configured to receive the transaction data sent by the network bank server, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server, in which the network bank server is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified.
- a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by the network bank server, so as to complete the transaction.
- first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
- Embodiments of another aspect of the present disclosure provide a transaction method.
- the transaction method comprises sending by a first electronic signature token first signed transaction data to a network bank server; verifying by the network bank server the first signed transaction data, and sending the transaction data to at least one second electronic signature token if the first signed transaction data is successfully verified; indicating by the at least one second electronic signature token the transaction data for confirming by a user; receiving by the at least one second electronic signature token a user confirmation input by the user after confirming that the transaction data is correct; signing by the at least one second electronic signature token a second signature on the transaction data to obtain at least one second signed transaction data and sending the at least one second transaction data to the network bank server; and verifying by the network bank server the at least one second signed transaction data, and performing a transaction if the at least one second signed transaction data is successfully verified.
- a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction.
- first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the signed transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
- Any process or method described in a flow chart or described herein in other ways may be understood to include one or more modules, segments or portions of codes of executable instructions for achieving specific logical functions or steps in the process.
- the flow chart shows a specific order of execution, it is understood that the order of execution may differ from what is depicted. For example, the order of execution of two or more boxes may be scrambled relative to the order shown.
- Fig. 1 is a block diagram of a transaction system according to an embodiment of the present disclosure.
- the transaction system comprises a first electronic signature token 100, a network bank server 200 and a second electronic signature token 300.
- the first electronic signature token 100 is configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data to the network bank server 200.
- a first signature may be signed on the transaction data of the transfer transaction by the first electronic signature token 100 to obtain the first signed transaction data, and then the first signed transaction data may be sent by the first electronic signature token 100 to the network bank server 200.
- the first electronic signature token 100 may sign the first signature on the transaction data using a password input by the initiator.
- the network bank server 200 is configured to receive the first signed transaction data sent by the first electronic signature token 100, to verify the first signed transaction data, and to send the transaction data to the second electronic signature token 300 if the first signed transaction data is successfully verified.
- the second electronic signature token 300 is configured to receive the transaction data sent by the network bank server 200, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server 200. Then, the network bank server 200 is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified.
- Each transaction confirmation party may obtain the transaction data using his own second electronic signature token 300, and may press an enter key after inputting a password possessed by himself or may press the enter key directly.
- the second electronic signature token 300 may sign the second signature on the transaction data according to the password input by the user or according to a predetermined cipher code obtained based on confirmation information sent by the enter key, and may send the second signed transaction data to the network bank server 200 for confirming the transaction. In this way, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of the enterprise user is kept by only one keeper may be avoided.
- the network bank server 200 is further configured to receive a plurality of second signed transaction data sent by a plurality of second electronic signature tokens 300, to verify the plurality of second signed transaction data respectively and to perform the transaction if a predetermined percentage of the plurality of second signed transaction data is successfully verified.
- the network bank server 200 receives five second signed transaction data sent by five second electronic signature tokens 300 respectively and verifies the five second signed transaction data respectively, and if three second signed transaction data is successfully verified, then the transaction is performed.
- the network bank server 200 only receives three second signed transaction data sent by three second electronic signature tokens 300 and all the three second signed transaction data is successfully verified, then the transaction is performed.
- the predetermined percentage may be preset by the user according to the user's requirement or may be a default value of the network bank server 200.
- a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction.
- first electronic signature token and the second electronic signature token are working together to perform the transaction, and there are one or more second electronic signature tokens, such that the first signed transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
- Fig. 2 is a block diagram of a transaction system according to another embodiment of the present disclosure.
- the transaction system further comprises a first terminal 400 and a second terminal 500.
- Each of the first terminal 400 and the second terminal 500 may be a smart phone, a tablet PC, a laptop, a personal computer and so on.
- the first terminal 400 is configured to receive the first signed transaction data sent by the first electronic signature token 100, and to forward the first signed transaction data to the network bank server 200.
- Each second terminal 500 corresponds to one second electronic signature token 300, and is configured to receive the transaction data sent by the network bank server 200, to forward the transaction data to the second electronic signature token 300, to receive the second signed transaction data sent by the second electronic signature token 300, and to forward the second signed transaction data to the network bank server 200.
- the transaction data may be transmitted between the first electronic signature token and the network bank server via the first terminal, and may be transmitted between the second electronic signature token and the network bank server via the second terminal, such that an electronic transaction may be accomplished whenever and wherever the user wants, thus enhancing the convenience of the electronic transaction.
- the first electronic signature token 100 is further configured to send a pre-stored identification of the first electronic signature token 100 to the network bank server 200, and the network bank server 200 is further configured to send the identification of the first electronic signature token 100 to the at least one second electronic signature token 300, and the at least one second electronic signature token 300 is further configured to confirm the identification of the first electronic signature token 100.
- the pre-stored identification of the first electronic signature token 100 may be configured to determine an identity of the first electronic signature token 100 uniquely. Therefore, during the transaction, the network bank server 200 may determine the identity of the first electronic signature token 100 according to the identification of the first electronic signature token 100, such that an imposter may be prevented from sending transaction data, thus ensuring the security of the transaction.
- the network bank server 200 is further configured to send a bank identification for the transaction to the at least one second electronic signature token 300, and the at least one second electronic signature token 300 is further configured to confirm the bank identification.
- the bank identification is configured to determine an identity of the bank uniquely. Therefore, a person may be prevented from impersonating a bank to send transaction data, such that it is ensured that the transaction data is real data sent by a bank, thus improving the security of the electronic transaction and improving the user experience.
- the present disclosure provides a transaction method.
- Fig. 3 is a flow chart of a transaction method according to an embodiment of the present disclosure.
- the transaction method may comprise following steps.
- first signed transaction data is sent by a first electronic signature token to a network bank server.
- a first signature may be signed on the transaction data of the transfer transaction by the first electronic signature token to obtain the first signed transaction data, and then the first signed transaction data may be sent by the first electronic signature token to the network bank server.
- the first electronic signature token may sign the first signature on the transaction data using a password input by the initiator.
- the first electronic signature token may send the first singed transaction data to a first terminal firstly, and then the first signed transaction data is sent to the network bank server by the first terminal.
- the first signed transaction data is verified by the network bank server, and the transaction data is sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
- the network bank server may send the transaction data to at least one second terminal firstly, and then the transaction data is sent to the at least one second electronic signature token by the at least one second terminal respectively.
- Each of the first electronic signature token and the at least one second electronic signature token may be a secret key device such as a USB key.
- Each second terminal corresponds to one second electronic signature token.
- Each of the first terminal and the second terminal may be a smart phone, a tablet PC, a laptop, a personal computer and so on.
- the transaction data is indicated by the at least one second electronic signature token for confirming by a user.
- Each transaction confirmation party may obtain the transaction data by the second electronic signature token possessed by himself.
- the second electronic signature token may indicate the transaction data for confirming by the user by displaying or broadcasting the transaction data.
- step S304 a user confirmation input by the user after confirming that the transaction data is correct is received by the at least one second electronic signature token.
- the user confirmation may be sent by the user through pressing an enter key directly or pressing the enter key after inputting a password.
- a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent respectively by the at least one electronic signature token to the network bank server.
- the second electronic signature token verifies whether the password is correct firstly. And if the password is correct, the second electronic signature token signs the second signature on the transaction data according to the password to obtain the second signed transaction data, and sends the second signed transaction data to the network bank server. If the user confirmation is sent by the user through pressing the enter key directly, the second electronic signature token signs the second signature on the transaction data according to a predetermined cipher code so as to obtain the second signed transaction data, and sends the second signed transaction data to the network bank server.
- the at least one second signed transaction data is verified by the network bank server, and a transaction is performed if the at least one second signed transaction data is successfully verified.
- the transaction when the network bank server verifies the plurality of second signed transaction data sent by the plurality of second electronic signature tokens, the transaction may be performed if a predetermined percentage of the plurality of second signed transaction data is successfully verified. For example, the network bank server receives five second signed transaction data sent by five second electronic signature tokens and verifies the five second signed transaction data respectively, and if three second signed transaction data is successfully verified, then the transaction is performed.
- the predetermined percentage may be preset by the user according to the user's requirement or may be a default value of the network bank server.
- a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction.
- first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
- Fig. 4 is a flow chart of a transaction method according to another embodiment of the present disclosure.
- the transaction method comprises following steps.
- first signed transaction data is sent by a first electronic signature token to a network bank server.
- the first signed transaction data is verified by the network bank server, and the transaction data and a bank identification corresponding to a transaction are sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
- the bank identification is configured to determine an identity of the bank uniquely.
- step S403 the bank identification is verified by the at least one second electronic signature token respectively, and the transaction data is indicated for confirming by a user after the bank identification is successfully verified.
- a user confirmation input by the user after confirming that the transaction data is correct is received by the at least one second electronic signature token.
- a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent respectively by the at least one second electronic signature token to the network bank server.
- the at least one second signed transaction data is verified by the network bank server, and the transaction is performed if the at least one second signed transaction data is successfully verified.
- an identity of the bank may be determined uniquely from the bank identification. Therefore, a person may be prevented from impersonating a bank to send transaction data, such that it is ensured that the transaction data is real data sent by a bank, thus improving the security of the electronic transaction.
- Fig. 5 is a flow chart of a transaction method according to yet another embodiment of the present disclosure.
- the transaction method may comprise following steps.
- first signed transaction data and a pre-stored identification of a first electronic signature token are sent by the first electronic signature token to a network bank server.
- the identification of the first electronic signature token may be configured to determine an identity of the first electronic signature token uniquely.
- the first signed transaction data is verified by the network bank server, and the transaction data and the identification of the first electronic signature token are sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
- the transaction data and the identification of the first electronic signature token are indicated by the at least one second electronic signature token for confirming by a user the transaction data and an identity of an initiator initiating the transaction.
- a user confirmation input by the user after confirming that the transaction data and the identity of the initiator are correct is received by the at least one second electronic signature token.
- a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent to the network bank server.
- the at least one second signed transaction data is verified by the network bank server, and the transaction is performed if the at least one second signed transaction data is successfully verified.
- the network bank server may determine an identity of the first electronic signature token according to the identification of the first electronic signature token, such that an imposter may be prevented from sending transaction data, thus ensuring the security of the transaction.
- a combination of the transaction method illustrated in Fig. 4 and the transaction method illustrated in Fig. 5 may be implemented, that is, the identification of the first electronic signature token and the bank identification are used together to further ensure the security of a transaction.
Abstract
Description
- The present disclosure relates to a field of information security, and more particularly relates to a transaction system and a transaction method.
- In order to ensure the security of information in a bank transaction and a network transaction, an identity authentication for a user is required. As a device for verifying the user's identity, an electronic signature token is increasingly applied in many occasions (such as the bank transaction, the network transaction). At present, there is only one electronic signature token corresponding to an individual user or an enterprise user. If a transaction is performed by using this electronic signature token, there are following problems.
- (1) There is a hidden danger that money in an enterprise account is transferred without permission since the electronic signature token of the enterprise user is kept by only one keeper.
- (2) When the enterprise user performs an electronic transaction, the keeper of the electronic signature token must be present, otherwise the electronic transaction cannot be accomplished. Thus, it is inconvenient for the enterprise user due to the keeper's absence.
- The present disclosure seeks to solve at least one of the above problems.
- Accordingly, embodiments of an aspect of the present disclosure provide a transaction system. The transaction system includes: a first electronic signature token, configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data; a network bank server, configured to receive the first signed transaction data sent by the first electronic signature token, to verify the first signed transaction data, and to send the transaction data if the first signed transaction data is successfully verified; and at least one second electronic signature token, configured to receive the transaction data sent by the network bank server, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server, in which the network bank server is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified.
- With the transaction system according to embodiments of the present disclosure, a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by the network bank server, so as to complete the transaction. Since the first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
- Embodiments of another aspect of the present disclosure provide a transaction method. The transaction method comprises sending by a first electronic signature token first signed transaction data to a network bank server; verifying by the network bank server the first signed transaction data, and sending the transaction data to at least one second electronic signature token if the first signed transaction data is successfully verified; indicating by the at least one second electronic signature token the transaction data for confirming by a user; receiving by the at least one second electronic signature token a user confirmation input by the user after confirming that the transaction data is correct; signing by the at least one second electronic signature token a second signature on the transaction data to obtain at least one second signed transaction data and sending the at least one second transaction data to the network bank server; and verifying by the network bank server the at least one second signed transaction data, and performing a transaction if the at least one second signed transaction data is successfully verified.
- With the transaction method according to embodiments of the present disclosure, a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction. Since the first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the signed transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
- Additional aspects and advantages of embodiments of present disclosure will be given in part in the following descriptions, become apparent in part from the following descriptions, or be learned from the practice of the embodiments of the present disclosure.
- These and other aspects and advantages of embodiments of the present disclosure will become apparent and more readily appreciated from the following descriptions made with reference to the accompanying drawings, in which:
-
Fig. 1 is a block diagram of a transaction system according to an embodiment of the present disclosure; -
Fig. 2 is a block diagram of a transaction system according to another embodiment of the present disclosure; -
Fig. 3 is a flow chart of a transaction method according to an embodiment of the present disclosure; -
Fig. 4 is a flow chart of a transaction method according to another embodiment of the present disclosure; -
Fig. 5 is a flow chart of a transaction method according to yet another embodiment of the present disclosure. - Reference will be made in detail to embodiments of the present disclosure, where the same or similar elements and the elements having same or similar functions are denoted by like reference numerals throughout the descriptions. The embodiments described herein with reference to drawings are explanatory, illustrative, and used to generally understand the present disclosure. The embodiments shall not be construed to limit the present disclosure.
- In the description of the present disclosure, it should be understood that, terms such as "first" and "second" are used herein for purposes of description, and are not intended to represent or indicate relative importance or significance or to represent or indicate numbers or locations. In the description of the present disclosure, it should be understood that, unless specified or limited otherwise, terms such as "connected" and "coupled" should be understood broadly, and may be, for example, fixed connections, detachable connections, or integral connections; or may be mechanical or electrical connections; or may be direct connections or indirect connections via intervening structures, which can be understood by those skilled in the art according to specific situations. Moreover, in the description of the present invention, unless specified otherwise, "a plurality of" means two or more than two.
- Any process or method described in a flow chart or described herein in other ways may be understood to include one or more modules, segments or portions of codes of executable instructions for achieving specific logical functions or steps in the process. Although the flow chart shows a specific order of execution, it is understood that the order of execution may differ from what is depicted. For example, the order of execution of two or more boxes may be scrambled relative to the order shown.
- In the following, a transaction system and a transaction method according to embodiments of the present disclosure will be described in detail with reference to drawings.
-
Fig. 1 is a block diagram of a transaction system according to an embodiment of the present disclosure. - As shown in
Fig. 1 , the transaction system according to embodiments of the present disclosure comprises a firstelectronic signature token 100, a network bank server 200 and a secondelectronic signature token 300. There is at least one secondelectronic signature token 300 in the transaction system, and each of the firstelectronic signature token 100 and the at least one secondelectronic signature token 300 may be a secret key device such as a USB key. - Specifically, the first
electronic signature token 100 is configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data to the network bank server 200. For example, if an initiator initiates a transfer transaction, a first signature may be signed on the transaction data of the transfer transaction by the firstelectronic signature token 100 to obtain the first signed transaction data, and then the first signed transaction data may be sent by the firstelectronic signature token 100 to the network bank server 200. Of course, if the initiator initiates a transaction, the firstelectronic signature token 100 may sign the first signature on the transaction data using a password input by the initiator. - The network bank server 200 is configured to receive the first signed transaction data sent by the first
electronic signature token 100, to verify the first signed transaction data, and to send the transaction data to the secondelectronic signature token 300 if the first signed transaction data is successfully verified. - The second
electronic signature token 300 is configured to receive the transaction data sent by the network bank server 200, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server 200. Then, the network bank server 200 is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified. In embodiments of the present disclosure, there may be one or more secondelectronic signature tokens 300. That is, when the transaction is performed, the transaction data may be verified and confirmed by one or more transaction confirmation parties. Each transaction confirmation party may obtain the transaction data using his own secondelectronic signature token 300, and may press an enter key after inputting a password possessed by himself or may press the enter key directly. The secondelectronic signature token 300 may sign the second signature on the transaction data according to the password input by the user or according to a predetermined cipher code obtained based on confirmation information sent by the enter key, and may send the second signed transaction data to the network bank server 200 for confirming the transaction. In this way, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of the enterprise user is kept by only one keeper may be avoided. - It should be understood that, in an embodiment of the present disclosure, in order to improve the execution efficiency of the transaction, the network bank server 200 is further configured to receive a plurality of second signed transaction data sent by a plurality of second
electronic signature tokens 300, to verify the plurality of second signed transaction data respectively and to perform the transaction if a predetermined percentage of the plurality of second signed transaction data is successfully verified. For example, the network bank server 200 receives five second signed transaction data sent by five secondelectronic signature tokens 300 respectively and verifies the five second signed transaction data respectively, and if three second signed transaction data is successfully verified, then the transaction is performed. For another example, there are five secondelectronic signature tokens 300 in the transaction system, if the network bank server 200 only receives three second signed transaction data sent by three secondelectronic signature tokens 300 and all the three second signed transaction data is successfully verified, then the transaction is performed. The predetermined percentage may be preset by the user according to the user's requirement or may be a default value of the network bank server 200. - With the transaction system according to embodiments of the present disclosure, a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction. Since the first electronic signature token and the second electronic signature token are working together to perform the transaction, and there are one or more second electronic signature tokens, such that the first signed transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
-
Fig. 2 is a block diagram of a transaction system according to another embodiment of the present disclosure. - As shown in
Fig. 2 , based on the transaction system illustrated inFig. 1 , the transaction system according to embodiments of the present disclosure further comprises afirst terminal 400 and asecond terminal 500. There may be one or moresecond terminals 500, and a number of thesecond terminals 500 is equal to a number of the secondelectronic signature tokens 300. Each of thefirst terminal 400 and thesecond terminal 500 may be a smart phone, a tablet PC, a laptop, a personal computer and so on. - The
first terminal 400 is configured to receive the first signed transaction data sent by the firstelectronic signature token 100, and to forward the first signed transaction data to the network bank server 200. - Each
second terminal 500 corresponds to one secondelectronic signature token 300, and is configured to receive the transaction data sent by the network bank server 200, to forward the transaction data to the secondelectronic signature token 300, to receive the second signed transaction data sent by the secondelectronic signature token 300, and to forward the second signed transaction data to the network bank server 200. - With the transaction system according to this embodiment, the transaction data may be transmitted between the first electronic signature token and the network bank server via the first terminal, and may be transmitted between the second electronic signature token and the network bank server via the second terminal, such that an electronic transaction may be accomplished whenever and wherever the user wants, thus enhancing the convenience of the electronic transaction.
- In some embodiments of the present disclosure, the first
electronic signature token 100 is further configured to send a pre-stored identification of the firstelectronic signature token 100 to the network bank server 200, and the network bank server 200 is further configured to send the identification of the firstelectronic signature token 100 to the at least one secondelectronic signature token 300, and the at least one secondelectronic signature token 300 is further configured to confirm the identification of the firstelectronic signature token 100. The pre-stored identification of the firstelectronic signature token 100 may be configured to determine an identity of the firstelectronic signature token 100 uniquely. Therefore, during the transaction, the network bank server 200 may determine the identity of the firstelectronic signature token 100 according to the identification of the firstelectronic signature token 100, such that an imposter may be prevented from sending transaction data, thus ensuring the security of the transaction. - In another embodiment of the present disclosure, the network bank server 200 is further configured to send a bank identification for the transaction to the at least one second
electronic signature token 300, and the at least one secondelectronic signature token 300 is further configured to confirm the bank identification. The bank identification is configured to determine an identity of the bank uniquely. Therefore, a person may be prevented from impersonating a bank to send transaction data, such that it is ensured that the transaction data is real data sent by a bank, thus improving the security of the electronic transaction and improving the user experience. - In order to implement the above embodiments, the present disclosure provides a transaction method.
-
Fig. 3 is a flow chart of a transaction method according to an embodiment of the present disclosure. - As shown in
Fig. 3 , the transaction method according to embodiments of the present disclosure may comprise following steps. - At step S301, first signed transaction data is sent by a first electronic signature token to a network bank server.
- For example, if an initiator initiates a transfer transaction, a first signature may be signed on the transaction data of the transfer transaction by the first electronic signature token to obtain the first signed transaction data, and then the first signed transaction data may be sent by the first electronic signature token to the network bank server. Of course, if the initiator initiates a transaction, the first electronic signature token may sign the first signature on the transaction data using a password input by the initiator.
- In some embodiments of the present disclosure, the first electronic signature token may send the first singed transaction data to a first terminal firstly, and then the first signed transaction data is sent to the network bank server by the first terminal.
- At step S302, the first signed transaction data is verified by the network bank server, and the transaction data is sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
- In some embodiments of the present disclosure, the network bank server may send the transaction data to at least one second terminal firstly, and then the transaction data is sent to the at least one second electronic signature token by the at least one second terminal respectively.
- Each of the first electronic signature token and the at least one second electronic signature token may be a secret key device such as a USB key. Each second terminal corresponds to one second electronic signature token. Each of the first terminal and the second terminal may be a smart phone, a tablet PC, a laptop, a personal computer and so on.
- At step S303, the transaction data is indicated by the at least one second electronic signature token for confirming by a user.
- For example, one or more transaction confirmation parties may be required during the transaction. Each transaction confirmation party may obtain the transaction data by the second electronic signature token possessed by himself. The second electronic signature token may indicate the transaction data for confirming by the user by displaying or broadcasting the transaction data.
- At step S304, a user confirmation input by the user after confirming that the transaction data is correct is received by the at least one second electronic signature token.
- The user confirmation may be sent by the user through pressing an enter key directly or pressing the enter key after inputting a password.
- At step S305, a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent respectively by the at least one electronic signature token to the network bank server.
- If the user confirmation is sent by the user through pressing the enter key after inputting the password, the second electronic signature token verifies whether the password is correct firstly. And if the password is correct, the second electronic signature token signs the second signature on the transaction data according to the password to obtain the second signed transaction data, and sends the second signed transaction data to the network bank server. If the user confirmation is sent by the user through pressing the enter key directly, the second electronic signature token signs the second signature on the transaction data according to a predetermined cipher code so as to obtain the second signed transaction data, and sends the second signed transaction data to the network bank server.
- At step S306, the at least one second signed transaction data is verified by the network bank server, and a transaction is performed if the at least one second signed transaction data is successfully verified.
- In some embodiments of the present disclosure, there may be one or more second electronic signature tokens. That is, when the transaction is performed, the transaction data may be verified and confirmed by one or more transaction confirmation parties. Each transaction confirmation party may obtain the transaction data by the second electronic signature token possessed by himself, and may input the password possessed by himself according to the transaction data. The second electronic signature token may sign the second signature on the transaction data according to the password so as to obtain second signed transaction data, and may send the second signed transaction data to the network bank server for confirming the transaction. In this way, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided.
- In an embodiment of the present disclosure, when the network bank server verifies the plurality of second signed transaction data sent by the plurality of second electronic signature tokens, the transaction may be performed if a predetermined percentage of the plurality of second signed transaction data is successfully verified. For example, the network bank server receives five second signed transaction data sent by five second electronic signature tokens and verifies the five second signed transaction data respectively, and if three second signed transaction data is successfully verified, then the transaction is performed. The predetermined percentage may be preset by the user according to the user's requirement or may be a default value of the network bank server.
- With the transaction method according to embodiments of the present disclosure, a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction. Since the first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
-
Fig. 4 is a flow chart of a transaction method according to another embodiment of the present disclosure. - As shown in
Fig. 4 , the transaction method according to embodiments of the present disclosure comprises following steps. - At step S401, first signed transaction data is sent by a first electronic signature token to a network bank server.
- At step S402, the first signed transaction data is verified by the network bank server, and the transaction data and a bank identification corresponding to a transaction are sent to at least one second electronic signature token if the first signed transaction data is successfully verified. The bank identification is configured to determine an identity of the bank uniquely.
- At step S403, the bank identification is verified by the at least one second electronic signature token respectively, and the transaction data is indicated for confirming by a user after the bank identification is successfully verified.
- At step S404, a user confirmation input by the user after confirming that the transaction data is correct is received by the at least one second electronic signature token.
- At step S405, a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent respectively by the at least one second electronic signature token to the network bank server.
- At step S406, the at least one second signed transaction data is verified by the network bank server, and the transaction is performed if the at least one second signed transaction data is successfully verified.
- With the transaction method according to this embodiment, an identity of the bank may be determined uniquely from the bank identification. Therefore, a person may be prevented from impersonating a bank to send transaction data, such that it is ensured that the transaction data is real data sent by a bank, thus improving the security of the electronic transaction.
-
Fig. 5 is a flow chart of a transaction method according to yet another embodiment of the present disclosure. - As shown in
Fig. 5 , the transaction method according to embodiments of the present disclosure may comprise following steps. - At step S501, first signed transaction data and a pre-stored identification of a first electronic signature token are sent by the first electronic signature token to a network bank server. The identification of the first electronic signature token may be configured to determine an identity of the first electronic signature token uniquely.
- At step S502, the first signed transaction data is verified by the network bank server, and the transaction data and the identification of the first electronic signature token are sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
- At step S503, the transaction data and the identification of the first electronic signature token are indicated by the at least one second electronic signature token for confirming by a user the transaction data and an identity of an initiator initiating the transaction.
- At step S504, a user confirmation input by the user after confirming that the transaction data and the identity of the initiator are correct is received by the at least one second electronic signature token.
- At step S505, a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent to the network bank server.
- At step S506, the at least one second signed transaction data is verified by the network bank server, and the transaction is performed if the at least one second signed transaction data is successfully verified.
- With the transaction method according to this embodiment, during the transaction, the network bank server may determine an identity of the first electronic signature token according to the identification of the first electronic signature token, such that an imposter may be prevented from sending transaction data, thus ensuring the security of the transaction.
- It should be understood that, a combination of the transaction method illustrated in
Fig. 4 and the transaction method illustrated inFig. 5 may be implemented, that is, the identification of the first electronic signature token and the bank identification are used together to further ensure the security of a transaction. - Although explanatory embodiments have been shown and described, it would be appreciated by those skilled in the art that the above embodiments cannot be construed to limit the present disclosure, and changes, alternatives, and modifications can be made in the embodiments without departing from spirit, principles and scope of the present disclosure.
Claims (12)
- A transaction system, comprising:a first electronic signature token, configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data;a network bank server, configured to receive the first signed transaction data sent by the first electronic signature token, to verify the first signed transaction data, and to send the transaction data if the first signed transaction data is successfully verified; andat least one second electronic signature token, configured to receive the transaction data sent by the network bank server, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server,wherein the network bank server is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified.
- The transaction system according to claim 1, further comprising:a first terminal, configured to receive the first signed transaction data sent by the first electronic signature token, and to forward the first signed transaction data to the network bank server; andat least one second terminal, wherein each second terminal corresponds to one second electronic signature token, and is configured to receive the transaction data sent by the network bank server, to forward the transaction data to the corresponding second electronic signature token, to receive the second signed transaction data sent by the corresponding second electronic signature token, and to forward the second signed transaction data to the network bank server.
- The transaction system according to claim 1, wherein the first electronic signature token is further configured to send a pre-stored identification of the first electronic signature token to the network bank server, and the network bank server is further configured to send the identification of the first electronic signature token to the at least one second electronic signature token, and the at least one second electronic signature token is further configured to confirm the identification of the first electronic signature token.
- The transaction system according to claim 1, wherein the network bank server is further configured to send a bank identification for the transaction to the at least one second electronic signature token, and the at least one second electronic signature token is further configured to confirm the bank identification.
- The transaction system according to claim 1, wherein the system comprises a plurality of second electronic signature tokens.
- The transaction system according to claim 1, wherein the network bank server is further configured to receive a plurality of second signed transaction data sent by the plurality of second electronic signature tokens, to verify the plurality of second signed transaction data respectively and to perform the transaction if a predetermined percentage of the plurality of second signed transaction data is successfully verified.
- A transaction method, comprising:sending by a first electronic signature token first signed transaction data to a network bank server;verifying by the network bank server the first signed transaction data, and sending the transaction data to at least one second electronic signature token if the first signed transaction data is successfully verified;indicating by the at least one second electronic signature token the transaction data for confirming by a user;receiving by the at least one second electronic signature token a user confirmation input by the user after confirming that the transaction data is correct;signing by the at least one second electronic signature token a second signature on the transaction data to obtain at least one second signed transaction data andsending the at least one second transaction data to the network bank server; and verifying by the network bank server the at least one second signed transaction data, and performing a transaction if the at least one second signed transaction data is successfully verified.
- The transaction method according to claim 7, further comprising:sending by the first electronic signature token the first signed transaction data to a first terminal;forwarding by the first terminal the first signed transaction data to the network bank server.
- The transaction method according to claim 7, further comprising:sending by the network bank server the transaction data to at least one second terminal;forwarding by the at least one second terminal the transaction data to the at least one second electronic signature token respectively.
- The transaction method according to claim 7, further comprising:sending a bank identification for the transaction to the at least one second electronic signature token when the transaction data is sent by the network bank server to the at least one second electronic signature token;verifying by the at least one second electronic signature token the bank identification, and indicating the transaction data if the bank identification is successfully verified.
- The transaction method according to claim 7, further comprising:sending a pre-stored identification of the first electronic signature token to the network bank server when the first signed transaction data is sent by the first electronic signature token to the network bank server;sending by the network bank server the identification of the first electronic signature token to the at least one second electronic signature token;indicating by the at least one second electronic signature token the identification of the first electronic signature token such that the user confirms an identity of an initiator initiating the transaction.
- The transaction method according to claim 7, wherein when the network bank server verifies a plurality of second signed transaction data sent by a plurality of second electronic signature tokens, the transaction is performed if a predetermined percentage of the plurality of second signed transaction data is successfully verified.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210433981.XA CN102983973B (en) | 2012-11-02 | 2012-11-02 | Transaction system and method for commerce |
PCT/CN2013/086206 WO2014067456A1 (en) | 2012-11-02 | 2013-10-30 | Transaction system and transaction method |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2916483A1 true EP2916483A1 (en) | 2015-09-09 |
EP2916483A4 EP2916483A4 (en) | 2016-07-13 |
Family
ID=47857735
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP13850096.2A Withdrawn EP2916483A4 (en) | 2012-11-02 | 2013-10-30 | Transaction system and transaction method |
Country Status (4)
Country | Link |
---|---|
US (1) | US20150294310A1 (en) |
EP (1) | EP2916483A4 (en) |
CN (1) | CN102983973B (en) |
WO (1) | WO2014067456A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102983973B (en) * | 2012-11-02 | 2018-11-30 | 天地融科技股份有限公司 | Transaction system and method for commerce |
CN104077689B (en) * | 2013-10-30 | 2016-01-20 | 腾讯科技(深圳)有限公司 | A kind of method of Information Authentication, relevant apparatus and system |
US11055721B2 (en) | 2013-10-30 | 2021-07-06 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for information verification |
US10210515B2 (en) * | 2015-11-23 | 2019-02-19 | Mastercard International Incorporated | Systems and methods for use in verifying recurring transactions to payment accounts |
CN106056419A (en) * | 2015-11-25 | 2016-10-26 | 天地融科技股份有限公司 | Method, system and device for realizing independent transaction by using electronic signature equipment |
CN105654296A (en) * | 2015-12-29 | 2016-06-08 | 中国建设银行股份有限公司 | Authentication method and system |
CN106021091B (en) * | 2016-05-04 | 2019-05-17 | 上海携程商务有限公司 | Internet bank's simulation system and method |
CN108076079A (en) * | 2016-11-09 | 2018-05-25 | 阿里巴巴集团控股有限公司 | A kind of user information obtains system, method and device |
CN114424231A (en) * | 2019-09-25 | 2022-04-29 | 夏普Nec显示器解决方案株式会社 | Electronic device, method for managing electronic device, and program |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5559887A (en) * | 1994-09-30 | 1996-09-24 | Electronic Payment Service | Collection of value from stored value systems |
US6970854B2 (en) * | 2001-05-25 | 2005-11-29 | Hewlett-Packard Development Company, L.P. | System for remote signature writing |
US20050044385A1 (en) * | 2002-09-09 | 2005-02-24 | John Holdsworth | Systems and methods for secure authentication of electronic transactions |
KR101503085B1 (en) * | 2006-12-27 | 2015-03-16 | 넥타르 테라퓨틱스 | Von willebrand factor- and factor viii-polymer conjugates having a releasable linkage |
US8401968B1 (en) * | 2008-03-27 | 2013-03-19 | Amazon Technologies, Inc. | Mobile group payments |
CN101344945A (en) * | 2008-08-22 | 2009-01-14 | 李东风 | Method for protecting integrality of electro-check by digital signature |
US8429078B2 (en) * | 2008-09-11 | 2013-04-23 | Visa U.S.A. Inc. | Payment processing device signature verification |
CN101588364B (en) * | 2009-03-31 | 2012-08-08 | 飞天诚信科技股份有限公司 | Signature method, device and system thereof |
CN101556668A (en) * | 2009-05-12 | 2009-10-14 | 中国工商银行股份有限公司 | Data processing method of bank card and system |
CN102202040B (en) * | 2010-03-26 | 2014-06-04 | 联想(北京)有限公司 | Client authentication method and device |
WO2012139286A1 (en) * | 2011-04-13 | 2012-10-18 | 北京天地融科技股份有限公司 | Transaction information confirmation device, electronic signature tool and system, and electronic signature method |
CN102184495B (en) * | 2011-04-21 | 2016-09-28 | 天地融科技股份有限公司 | A kind of method of network payment and system |
CN102983973B (en) * | 2012-11-02 | 2018-11-30 | 天地融科技股份有限公司 | Transaction system and method for commerce |
-
2012
- 2012-11-02 CN CN201210433981.XA patent/CN102983973B/en active Active
-
2013
- 2013-10-30 WO PCT/CN2013/086206 patent/WO2014067456A1/en active Application Filing
- 2013-10-30 EP EP13850096.2A patent/EP2916483A4/en not_active Withdrawn
- 2013-10-30 US US14/439,842 patent/US20150294310A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
CN102983973A (en) | 2013-03-20 |
CN102983973B (en) | 2018-11-30 |
WO2014067456A1 (en) | 2014-05-08 |
EP2916483A4 (en) | 2016-07-13 |
US20150294310A1 (en) | 2015-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2916483A1 (en) | Transaction system and transaction method | |
US20210081928A1 (en) | Systems and methods for linking devices to user accounts | |
CN104618116B (en) | A kind of cooperative digital signature system and its method | |
JP2012530311A5 (en) | ||
EP3009951A1 (en) | Authenticated self-service terminal (sst) access | |
US9712525B2 (en) | Validating biometrics without special purpose readers | |
US10839362B2 (en) | Offline pin authentication method and system for IC card | |
CN112055019B (en) | Method for establishing communication channel and user terminal | |
CN103380592A (en) | Method, server and system for authentication of a person | |
US20150052063A1 (en) | Method for the Mutual Authentication of Entities Having Previously Initiated an Online Transaction | |
US20200196143A1 (en) | Public key-based service authentication method and system | |
US20150310441A1 (en) | Transaction system method, electronic signature tool, and network bank server authentication | |
WO2015109958A1 (en) | Data processing method based on negotiation key, and mobile phone | |
EP2908262B1 (en) | Security Token, Transaction Execution Method, and Computer Program Product | |
WO2015158173A1 (en) | Agreement key-based data processing method | |
CN117336092A (en) | Client login method and device, electronic equipment and storage medium | |
CN108711053B (en) | Operation control system and operation control method | |
CN108174370B (en) | Bluetooth secure connection method, device, terminal and computer readable storage medium | |
EP3035588A1 (en) | System for verifying a one-time password | |
CN110061841B (en) | Signature method, signature verification method and signature verification device | |
JP2009536796A (en) | PC external signature apparatus having wireless communication capability | |
WO2017063545A1 (en) | Identity information input method and system relevant to transaction data | |
JP2019134268A (en) | Registration system and registration method | |
EP3751784B1 (en) | Digital signature system based on a cloud of dedicated local devices | |
CN202841157U (en) | Transaction system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20150416 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
RA4 | Supplementary search report drawn up and despatched (corrected) |
Effective date: 20160613 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 29/06 20060101ALI20160607BHEP Ipc: G06Q 20/38 20120101ALI20160607BHEP Ipc: G06Q 20/40 20120101ALI20160607BHEP Ipc: H04L 9/32 20060101AFI20160607BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20181130 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20190912 |